Blog

Securing computer applications and software is simply one of the most important stages of planning for development. After all, the level of usage is what determines success, and it reflects the number of active users in the app. There is no way you would refer about safety without referencing OWASP. The acronym OWASP is short…

Once you start your WordPress website, you have to pay attention to all security measurements in order to make your website safe for visitors. The below WordPress security tips will assist with the beginning steps to make WordPress more secure. Websites have constant attacks from hackers that try to take some personal data, take over…

On a Mac when you click a link that is a mailto link it will open the default email application, which is the MacOS Apple Mail app or just Mail.app. Many times you might have another email client such as Outlook or Spark, so you will need to change the default mail client to the…

I use iTerm2 in place of the default Terminal on MacOS or OSX. I was working on a project that has some Debian Stretch VM’s in Google Cloud, so I was logged into those VM’s via SSH using iTerm2. On previous operating systems I would SSH into using iTerm2 I had been able to simply…

I recently launched a WordPress website using Google Cloud’s Click to Deploy for a client and during that process phpMyAdmin is installed. Since this will allow full control of all of your MySQL database data, one thing that should be done immediately is to lock down phpMyAdmin so access is restricted and attackers cannot even…

Ever considered getting better privacy with a browser that’s been designed to shield online browsing sessions from prying eyes? Tor has been around for a long time and is widely considered one of the most popular private browsers out there. But the competing newcomer, Brave, has provided privacy-oriented people with a strong alternative. Both are…

Some of us, neophytes in security vulnerabilities, underestimate the damage XXE attacks can cause to a system. DoS attacks, sensitive data leaks, or server side forgery requests are only some of the threats that systems with XXE vulnerabilities are exposed to. Before we dive deeper into security aspects and attack types, it is important to…

When I first purchased the Belkin LED Lighting Starter Kit I didn’t have any issues getting the two A19 LED bulbs working with the Belkin WEMO Link Controller. I recently moved and had all sorts of problems getting the WEMO iPhone application to not only configure the WEMO Link Controller but once configured I could…

I am fairly new to TokuDB but so far I am impressed with the compression it provides to the data stored within. One of my clients has a ton of data that is constantly growing and thus TokuDB made a lot of sense for the solution that was created. While becoming more familiar with this…